Cybersecurity
Skills for Technology Services.
Having trouble getting through to your prospects? Understand the needs of prospects by training your technology services professionals on foundational cybersecurity concepts to help enrich sales conversations and close deals faster.
Cybersecurity Training for Technology Services
The solutions provided by technology services are designed to enhance the customer experience, optimize operations, and put clients at the forefront of technological innovation. From software development, mobile applications, or network integration services, potential clients need reassurance of the effectiveness of solutions and how they will uphold security posture through implementation and maintenance.
Prospects have unique issues and goals for their organization. By providing technology services professionals with fundamental cybersecurity training, they can better sympathize with and connect to the security needs of prospective clients, and in turn build trust and ultimately formulate partnerships.
Our 100% online role-based training program can be used to develop the foundational knowledge and skills needed to rapidly upskill or cross-skill your organization’s technology services teams. Does this meet an existing need or initiative within your organization? Use the form on this page to express your interest in the program to receive additional information and release updates.
What is the format of this course?
This program is a role-based training, comprehensive course that acts as a precursor to the Critical Knowledge training program. This course covers fundamental cybersecurity concepts and skills relevant to the day-to-day responsibilities of technology services professionals.
While detailed specifics will be available soon, this course will be delivered 100% online and will be available through On-Demand or Live Online delivery, with a host of other tools and resources housed within CyberVista’s online platform.
Who is this course for?
This course is designed to train for a variety of roles across all experience levels in technology services and technical sales. Individuals and teams that are currently responsible for tasks or subject areas that are cybersecurity-related in their nature are perfect candidates for this solution.
What are the benefits of this course?
Organizations participating in this offering will experience the following major benefits:
- Efficiently improve knowledge, skills, and abilities related to day-to-day development
- Mitigate immediate weaknesses across critical cybersecurity knowledge and skill areas
- Enrich sales conversations to build better opportunity pipeline and close deals faster
Interested?
Sign up for program updates.
Sales Engineers
Implementation Engineers
Account Executives
Solutions Architects
THIS OFFERING INCLUDES
An intelligent solution.
Diagnostic Assessment
Video Lessons
Practical Labs
Final Assessment
Final Analysis
Diagnostic Assessment

Diagnostic Assessment
Easily administer a diagnostic assessment is used to determine each team member’s strengths and weaknesses.
Video Lessons

Video Lessons
Engage with introductory videos, modular lessons, and lab walk-through videos.
Practical Labs

Practical Labs
When only practical experience will suffice, work through lab exercises to reinforce real-world skills applications.
Final Assessment

Final Assessment
Participants conclude training with a final assessment to determine improvement across knowledge and skills.
Final Analysis

Final Analysis
Receive valuable workforce and cybersecurity insights based on team performance.
Course content

01. SOC Organization & Processes
Learners will understand the roles and responsibilities of both the SOC and the SOC analysts within an organization.
More info:
This unit covers the SOC as a whole along with the roles and responsibilities of SOC analysts (by tiers) and other related teams.

02. Threats & Vulnerability Analysis
Learners will be able to conduct vulnerability assessment and analysis, threat research, and establish known-good and known-bad network baselines.
More info:
This unit teaches how to conduct a vulnerability assessment, how to analyze the results of the assessment, and how to conduct further research based on findings (e.g., relevant threat actors, known signatures, etc.).

03. Device Log Analysis
Learners will understand the importance and mechanisms of device logs, be able to conduct log analysis, and create scripts to automate analysis.
More info:
This unit covers how to find the logs on a machine (both Windows and Linux), analyze the logs for any suspicious activity, create alert triggers for IDS technologies, and create basic scripts in bash/PowerShell and Python for automation strategies.

04. Comprehensive Org. Event Correlation
Learners will understand the purpose and application of SIEMs, conduct analysis of SIEM results, correlate multiple network events, and detect evidence of post-attack strategies.
More info:
This unit covers an introduction to SIEMs, exposure to a SIEM interface, and tools/techniques to analyze SIEM results.

05. PCAP Analysis
Learners will be able to capture live traffic and conduct analysis on captured packets for indicators of network attacks.
More info:
This unit covers how to create PCAP files, and the different analysis techniques used to identify network attacks.

06. Incident Response
Learners will understand the Incident Response phases and determine indicators of compromise for given incidents.
More info:
This unit gives the students a taste of incident handling and provides further practice of PCAP/Log analysis.
FREE DOWNLOAD
6 Signs Your Cybersecurity Training Needs an Overhaul
62% of organizations don’t provide the proper amount of cybersecurity training to employees. Learn the signs of an under-performing training program and see how your organization stacks up.
